General

  • Target

    6a628eb28d74f80fdd2665c961015d4bfd55c71311f3c1bf4739763fa8ffb427_NeikiAnalytics.exe

  • Size

    1.7MB

  • Sample

    240625-rlrgdavcna

  • MD5

    fccaccfcffafd84ee76e24cb1b662e00

  • SHA1

    351d1cb76e7dec1c2979bdcfb861d755ab24e01c

  • SHA256

    6a628eb28d74f80fdd2665c961015d4bfd55c71311f3c1bf4739763fa8ffb427

  • SHA512

    1128cef5ef93ec3a243b33776c41ba3524b48d4dbe55f405b0c2dd06612962c62b7b53e0f72cf8180ee7d105f4d7794edcb99f4cfb716db95ec49e7bd887046a

  • SSDEEP

    49152:VPzQmGB/YSI+sfauFn2k+v6IFVUWAJiS2C:F5IiauxV+vjFtS2C

Malware Config

Targets

    • Target

      6a628eb28d74f80fdd2665c961015d4bfd55c71311f3c1bf4739763fa8ffb427_NeikiAnalytics.exe

    • Size

      1.7MB

    • MD5

      fccaccfcffafd84ee76e24cb1b662e00

    • SHA1

      351d1cb76e7dec1c2979bdcfb861d755ab24e01c

    • SHA256

      6a628eb28d74f80fdd2665c961015d4bfd55c71311f3c1bf4739763fa8ffb427

    • SHA512

      1128cef5ef93ec3a243b33776c41ba3524b48d4dbe55f405b0c2dd06612962c62b7b53e0f72cf8180ee7d105f4d7794edcb99f4cfb716db95ec49e7bd887046a

    • SSDEEP

      49152:VPzQmGB/YSI+sfauFn2k+v6IFVUWAJiS2C:F5IiauxV+vjFtS2C

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Reads user/profile data of web browsers

      Infostealers often target stored browser data, which can include saved credentials etc.

    • Adds Run key to start application

    • Enumerates connected drives

      Attempts to read the root path of hard drives other than the default C: drive.

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks